From: Song Liu <songliubraving@fb.com>
To: Andrew Morton <akpm@linux-foundation.org>
Cc: "linux-mm@kvack.org" <linux-mm@kvack.org>,
"matthew.wilcox@oracle.com" <matthew.wilcox@oracle.com>,
"kirill.shutemov@linux.intel.com"
<kirill.shutemov@linux.intel.com>,
Kernel Team <Kernel-team@fb.com>,
"william.kucharski@oracle.com" <william.kucharski@oracle.com>,
"chad.mynhier@oracle.com" <chad.mynhier@oracle.com>,
"mike.kravetz@oracle.com" <mike.kravetz@oracle.com>
Subject: Re: [PATCH v2 0/3] Enable THP for text section of non-shmem files
Date: Thu, 20 Jun 2019 02:04:14 +0000 [thread overview]
Message-ID: <603FB934-07C8-4486-84B2-BEBF1EB301FF@fb.com> (raw)
In-Reply-To: <20190619181354.325242c09d5c2ef44f430b4a@linux-foundation.org>
> On Jun 19, 2019, at 6:13 PM, Andrew Morton <akpm@linux-foundation.org> wrote:
>
> On Tue, 18 Jun 2019 21:48:16 +0000 Song Liu <songliubraving@fb.com> wrote:
>
>>> I'm wondering if this limitation can be abused in some fashion: mmap a
>>> file to which you have read permissions, run madvise(MADV_HUGEPAGE) and
>>> thus prevent the file's owner from being able to modify the file? Or
>>> something like that. What are the issues and protections here?
>>
>> In this case, the owner need to make a copy of the file, and then remove
>> and update the original file.
>>
>> In this version, we want either split huge page on writes, or fail the
>> write when we cannot split. However, the huge page information is only
>> available at page level, and on the write path, page level information
>> is not available until write_begin(). So it is hard to stop writes at
>> earlier stage. Therefore, in this version, we leverage i_mmap_writable,
>> which is at address_space level. So it is easier to stop writes to the
>> file.
>>
>> This is a temporary behavior. And it is gated by the config. So I guess
>> it is OK. It works well for our use cases though. Once we have better
>> write support, we can remove the limitation.
>>
>> If this is too weird, I am also open to suggestions.
>
> Well, it's more than weird? This permits user A to deny service to
> user B? User A can, maliciously or accidentally, prevent user B from
> modifying a file which user B has permission to modify? Such as, umm,
> /etc/hosts?
I have removed this behavior in v3. I think we really don't need this.
Thanks,
Song
next prev parent reply other threads:[~2019-06-20 2:04 UTC|newest]
Thread overview: 17+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-06-14 18:22 Song Liu
2019-06-14 18:22 ` [PATCH v2 1/3] mm: check compound_head(page)->mapping in filemap_fault() Song Liu
2019-06-17 14:59 ` Rik van Riel
2019-06-14 18:22 ` [PATCH v2 2/3] mm,thp: stats for file backed THP Song Liu
2019-06-17 15:00 ` Rik van Riel
2019-06-21 12:50 ` Kirill A. Shutemov
2019-06-21 14:09 ` Song Liu
2019-06-14 18:22 ` [PATCH v2 3/3] mm,thp: add read-only THP support for (non-shmem) FS Song Liu
2019-06-17 15:42 ` Rik van Riel
2019-06-21 12:58 ` Kirill A. Shutemov
2019-06-21 13:08 ` Song Liu
2019-06-21 13:11 ` Kirill A. Shutemov
2019-06-18 21:12 ` [PATCH v2 0/3] Enable THP for text section of non-shmem files Andrew Morton
2019-06-18 21:48 ` Song Liu
2019-06-20 1:13 ` Andrew Morton
2019-06-20 2:04 ` Song Liu [this message]
2019-06-19 6:26 ` Song Liu
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=603FB934-07C8-4486-84B2-BEBF1EB301FF@fb.com \
--to=songliubraving@fb.com \
--cc=Kernel-team@fb.com \
--cc=akpm@linux-foundation.org \
--cc=chad.mynhier@oracle.com \
--cc=kirill.shutemov@linux.intel.com \
--cc=linux-mm@kvack.org \
--cc=matthew.wilcox@oracle.com \
--cc=mike.kravetz@oracle.com \
--cc=william.kucharski@oracle.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox